Search
Search Results
-
RM-RPL: reliable mobility management framework for RPL-based IoT systems
This paper represents the Reliable Mobility Management of RPL (RM-RPL) protocol, specifically developed to overcome the limitations of the Routing...
-
RI-RPL: a new high-quality RPL-based routing protocol using Q-learning algorithm
The lack of a central controller, severe resource constraints, and multi-path data routing have turned data exchanges into one of the fundamental...
-
DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol
Resource Attacks in the Internet of Things (IoT) target to attack resource-related things. It affects the memory, processing, energy, and battery of...
-
Data Dissemination Framework for Optimizing Overhead in IoT-Enabled Systems Using Tabu-RPL
The IoT devices vary in terms of processing power, storage capacity, memory, and energy capabilities. These device heterogeneities pose unique...
-
Performance analysis of RPL protocol in different nodes positioning using Contiki Cooja
The routing protocol for low-power and lossy networks (RPL) protocol, tailored for the internet of things and wireless sensor networks, enhances...
-
RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments
Time-slotted Channel Hop** (TSCH) Media Access Control (MAC) was specified to target the Industrial Internet of Things needs. This MAC balances...
-
A novel RPL defense mechanism based on trust and deep learning for internet of things
Along with the significant growth of applications and facilities provided by the Internet of Things (IoT) in recent years, security challenges and...
-
Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case
The rank value of a node in Routing Protocol for Low Power and Lossy Networks (RPL) plays a significant role in preventing loops and route...
-
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN
The RPL routing protocol is susceptible to Selective Forwarding Attack (SFA), wherein malicious nodes selectively forward certain packets while...
-
Machine Learning Based Intelligent RPL Attack Detection System for IoT Networks
Routing Protocol for Low-Power and Lossy Networks (RPL) has been used in the Internet of Things (IoT) with Wireless Sensor Networks (WSNs), but it is... -
An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security
The internet of things (IoT) is a collection of systems connected to an online network consisting of things. Routing Protocol for Low-Power and...
-
Quality of Service Support in RPL Networks: Standing State and Future Prospects
The development of IP-based Internet of Things (IoT) networks would facilitate more effective end-to-end IP network architectures, but it remains a...
-
Enhanced RPL to Control Congestion in IoT: A Review
In recent years, Internet of things (IoT) has been used and contributed in various applications by connecting various devices to each other through... -
RPL-SVM: Making SVM Robust Against Missing Values and Partial Labels
With increased data availability, data quality is the biggest problem in using AI models. The data may suffer from missing values and noisy values.... -
Addressing DIO Suppression Attack in RPL based IoT Networks
The Internet of Things (IoT) has brought a revolution in technology in the last decade. IoT is susceptible to numerous internal routing attacks... -
Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments
The Routing Protocol for Low power and Lossy networks (RPL) utilises the Objective Function (OF) to form a Destination Oriented Directed Acyclic...
-
CQARPL: Congestion and QoS-aware RPL for IoT applications under heavy traffic
The Internet of Things (IoT) provides a common platform to connect the heterogeneous devices over the internet. Hence, the number of devices...
-
Mitigating the worst parent attack in RPL based internet of things
The Low Power and Lossy Networks (LLNs) in the Internet of Things environment comprising constrained embedded devices have particular routing...
-
Impact Analysis of Hello Flood Attack on RPL
The Internet of Things (IoT) has a wide range of applications that improve our quality of life with smart things that can connect without human... -
Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers
Internet of Things (IoT) is becoming a crucial requirement for linking numerous physical devices or gadgets to the web. Due to large volume of data...